-
1
-
-
0016562514
-
The wire-tap channel
-
Wyner, A. D.: The wire-tap channel. Bell Syst. Tech. J. 54, 1355-1387 (1975).
-
(1975)
Bell Syst. Tech. J
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
2
-
-
0017973511
-
Broadcast channels with confidential messages
-
Csiszár, I., Körner, J.: Broadcast channels with confidential messages. IEEE Trans. Inf. Theor. 24, 339-348 (1978).
-
(1978)
IEEE Trans. Inf. Theor
, vol.24
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
3
-
-
76249114101
-
-
Now Publishers, MA
-
Liang, Y., Poor, H. V., Shamai, S.: Information Theoretic Security. Now Publishers, MA (2009).
-
(2009)
Information Theoretic Security
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
5
-
-
45249119255
-
Secure communications over fading channels
-
Liang, Y., Poor, H. V., Shamai, S.: Secure communications over fading channels. IEEE Trans. Inf. Theor. 54, 2470-2492 (2008).
-
(2008)
IEEE Trans. Inf. Theor
, vol.54
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
6
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Gopala, P. K., Lai, L., El Gamal, H.: On the secrecy capacity of fading channels. IEEE Trans. Inf. Theor. 54, 4687-4698 (2008).
-
(2008)
IEEE Trans. Inf. Theor
, vol.54
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
El Gamal, H.3
-
7
-
-
51649104068
-
Secrecy capacity region of parallel broadcast channels
-
Liang, Y., Poor, H. V., Shamai, S.: Secrecy capacity region of parallel broadcast channels. In: ITA 2007, pp. 1291-1295 (2007).
-
(2007)
ITA 2007
, pp. 1291-1295
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
8
-
-
44049095075
-
Secret communication via multi-antenna transmission
-
Li, Z., Trappe, W., Yates, R.: Secret communication via multi-antenna transmission. In: CISS 2007, pp. 905-910 (2007).
-
(2007)
CISS 2007
, pp. 905-910
-
-
Li, Z.1
Trappe, W.2
Yates, R.3
-
9
-
-
77953802876
-
Secure transmission with multiple antennas I: The MISOME wiretap channel
-
Khisti, A., Wornell, G.: Secure transmission with multiple antennas I: the MISOME wiretap channel. IEEE Trans. Inf. Theor. 56, 3088-3104 (2010).
-
(2010)
IEEE Trans. Inf. Theor
, vol.56
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.2
-
10
-
-
45249085230
-
Secure communication with a fading eavesdropper channel
-
Li, Z., Yates, R., Trappe, W.: Secure communication with a fading eavesdropper channel. In: ISIT 2007, pp. 1296-1300 (2007).
-
(2007)
ISIT 2007
, pp. 1296-1300
-
-
Li, Z.1
Yates, R.2
Trappe, W.3
-
11
-
-
79957667257
-
Interference alignment for secrecy
-
Koyluoglu, O. O., El Gamal, H., Lai, L., Poor, H. V.: Interference alignment for secrecy. IEEE Trans. Inf. Theor. 57, 3323-3332 (2011).
-
(2011)
IEEE Trans. Inf. Theor
, vol.57
, pp. 3323-3332
-
-
Koyluoglu, O.O.1
El Gamal, H.2
Lai, L.3
Poor, H.V.4
-
12
-
-
79955491895
-
Interference assisted secret communication
-
Tang, X., Liu, R., Spasojevic, P., Poor, H. V.: Interference assisted secret communication. IEEE Trans. Inf. Theor. 57, 3153-3167 (2011).
-
(2011)
IEEE Trans. Inf. Theor
, vol.57
, pp. 3153-3167
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
Poor, H.V.4
-
13
-
-
84877662582
-
Physical layer security in wireless networks with passive and active eavesdroppers
-
Chortiy, A., Perlazay, S. M., Han, Z., Poor, H. V.: Physical layer security in wireless networks with passive and active eavesdroppers. In: IEEE GlobeCom 2012, pp. 4868-4873 (2012).
-
(2012)
IEEE GlobeCom 2012
, pp. 4868-4873
-
-
Chortiy, A.1
Perlazay, S.M.2
Han, Z.3
Poor, H.V.4
-
14
-
-
84890816230
-
The eavesdropping and jamming dilemma in multichannel communications
-
Garnaev, A., Trappe, W.: The eavesdropping and jamming dilemma in multichannel communications. In: IEEE ICC 2013, pp. 753-757 (2013).
-
(2013)
IEEE ICC 2013
, pp. 753-757
-
-
Garnaev, A.1
Trappe, W.2
-
15
-
-
84856969548
-
Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach
-
Zhu, Q., Saad, W., Han, Z., Poor, H. V., Basar, T.: Eavesdropping and jamming in next-generation wireless networks: a game-theoretic approach. In: MilCom 2011, pp. 119-124 (2011).
-
(2011)
MilCom 2011
, pp. 119-124
-
-
Zhu, Q.1
Saad, W.2
Han, Z.3
Poor, H.V.4
Basar, T.5
-
16
-
-
63749110244
-
A game-theoretic analysis of denial of service attacks in wireless random access
-
Sagduyu, Y. E., Ephremides, A.: A game-theoretic analysis of denial of service attacks in wireless random access. J. Wirel. Netw. 15, 651-666 (2009).
-
(2009)
J. Wirel. Netw
, vol.15
, pp. 651-666
-
-
Sagduyu, Y.E.1
Ephremides, A.2
-
17
-
-
84869597150
-
Jamming game in a dynamic slotted ALOHA network
-
Jain, R., Kannan, R. (eds.),. Springer, Heidelberg
-
Garnaev, A., Hayel, Y., Altman, E., Avrachenkov, K.: Jamming game in a dynamic slotted ALOHA network. In: Jain, R., Kannan, R. (eds.) GameNets 2011. LNICST, vol. 75, pp. 429-443. Springer, Heidelberg (2012).
-
(2012)
GameNets 2011. LNICST
, vol.75
, pp. 429-443
-
-
Garnaev, A.1
Hayel, Y.2
Altman, E.3
Avrachenkov, K.4
-
19
-
-
84866940712
-
A Bayesian Jamming Game in an OFDM Wireless Network
-
Garnaev, A., Hayel, Y., Altman, E.: A Bayesian Jamming Game in an OFDM Wireless Network. In: WiOpt 2012, pp. 41-48 (2012).
-
(2012)
WiOpt 2012
, pp. 41-48
-
-
Garnaev, A.1
Hayel, Y.2
Altman, E.3
-
20
-
-
77955905862
-
Taxation for green communication
-
Altman, E., Avrachenkov, K., Garnaev, A.: Taxation for green communication. In: WiOpt 2010, pp. 108-112 (2010).
-
(2010)
WiOpt 2010
, pp. 108-112
-
-
Altman, E.1
Avrachenkov, K.2
Garnaev, A.3
-
21
-
-
84877655292
-
Dependence of optimal monitoring strategy on the application to be protected
-
Garnaev, A., Trappe, W., Kung, C.-T.: Dependence of optimal monitoring strategy on the application to be protected. In: IEEE GlobeCom 2012, 1054-1059 (2012).
-
(2012)
IEEE GlobeCom 2012
, pp. 1054-1059
-
-
Garnaev, A.1
Trappe, W.2
Kung, C.-T.3
-
22
-
-
84890827106
-
Optimizing scanning strategies: Selecting scanning bandwidth in adversarial RF environments
-
Garnaev, A., Trappe, W., Kung, C.-T.: Optimizing scanning strategies: selecting scanning bandwidth in adversarial RF environments. In: CrownCom 2013 (2013).
-
(2013)
CrownCom 2013
-
-
Garnaev, A.1
Trappe, W.2
Kung, C.-T.3
-
23
-
-
79951614632
-
Optimal strategies for countering dual-threat jamming/eavesdropping-capable adversaries in MIMO channels
-
Mukherjee, A., Swindlehurst, A. L.: Optimal strategies for countering dual-threat jamming/eavesdropping-capable adversaries in MIMO channels. In: MilCom 2010, pp. 1695-1700 (2010).
-
(2010)
MilCom 2010
, pp. 1695-1700
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
24
-
-
84943252073
-
On the performance of IEEE 802. 11
-
Bayraktaroglu, E., King, C., Liu, X., Noubir, G., Rajaraman, R., Thapa, B.: On the performance of IEEE 802. 11. In: Infocom 2008 (2008).
-
(2008)
Infocom 2008
-
-
Bayraktaroglu, E.1
King, C.2
Liu, X.3
Noubir, G.4
Rajaraman, R.5
Thapa, B.6
-
25
-
-
0037003792
-
Denial of service attacks at the MAC layer in wireless ad hoc networks
-
Gupta, V., Krishnamurthy, S. V., Faloutsos, M.: Denial of service attacks at the MAC layer in wireless ad hoc networks. In: MilCom 2002, pp. 1118-1123 (2002).
-
(2002)
MilCom 2002
, pp. 1118-1123
-
-
Gupta, V.1
Krishnamurthy, S.V.2
Faloutsos, M.3
-
26
-
-
1542360013
-
Detection and handling of MAC layer misbehavior in wireless networks
-
Kyasanur, P., Vaidya, N.: Detection and handling of MAC layer misbehavior in wireless networks. In: DSN 2003, pp. 173-182 (2003).
-
(2003)
DSN 2003
, pp. 173-182
-
-
Kyasanur, P.1
Vaidya, N.2
-
27
-
-
34548314598
-
Optimal jamming attack and network defense policies in wireless sensor networks
-
Li, M., Koutsopoulos, I., Poovendran, R.: Optimal jamming attack and network defense policies in wireless sensor networks. In: Infocom 2007, pp. 1307-1315 (2007).
-
(2007)
Infocom 2007
, pp. 1307-1315
-
-
Li, M.1
Koutsopoulos, I.2
Poovendran, R.3
-
28
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
Xu, X., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: MobiHoc 2005, pp. 46-57 (2005).
-
(2005)
MobiHoc 2005
, pp. 46-57
-
-
Xu, X.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
29
-
-
50649125455
-
Game theoretic modeling of malicious users in collaborative networks
-
Theodorakopoulos, G., Baras, J. S.: Game theoretic modeling of malicious users in collaborative networks. IEEE JSAC 26, 1317-1327 (2008).
-
(2008)
IEEE JSAC
, vol.26
, pp. 1317-1327
-
-
Theodorakopoulos, G.1
Baras, J.S.2
-
30
-
-
0026240492
-
Jamming in slotted ALOHA multihop packet radio networks
-
Zander, J.: Jamming in slotted ALOHA multihop packet radio networks. IEEE Trans. Comm. 39, 1525-1531 (1991).
-
(1991)
IEEE Trans. Comm
, vol.39
, pp. 1525-1531
-
-
Zander, J.1
-
31
-
-
77349115760
-
Fair resource allocation in wireless networks in the presence of a jammer
-
Altman, E., Avrachenkov, K., Garnaev, A.: Fair resource allocation in wireless networks in the presence of a jammer. Perform. Eval. 67, 338-349 (2010).
-
(2010)
Perform. Eval
, vol.67
, pp. 338-349
-
-
Altman, E.1
Avrachenkov, K.2
Garnaev, A.3
-
32
-
-
79956100559
-
Jamming in wireless networks under uncertainty
-
Altman, E., Avrachenkov, K., Garnaev, A.: Jamming in wireless networks under uncertainty. Mob. Netw. Appl. 16, 246-254 (2011).
-
(2011)
Mob. Netw. Appl
, vol.16
, pp. 246-254
-
-
Altman, E.1
Avrachenkov, K.2
Garnaev, A.3
-
33
-
-
77953987046
-
A jamming-resistant MAC protocol for single-hop wireless networks
-
Awerbuch, B., Richa, A. W., Scheideler, C.: A jamming-resistant MAC protocol for single-hop wireless networks. In: ACM PODC 2008 (2008).
-
(2008)
ACM PODC 2008
-
-
Awerbuch, B.1
Richa, A.W.2
Scheideler, C.3
-
34
-
-
4544354908
-
Correlated jamming on MIMO gaussian fading channels
-
Kashyap, A., Basar, T., Srikant, R.: Correlated jamming on MIMO gaussian fading channels. IEEE Trans. Inf. Theor. 50, 2119-2123 (2004).
-
(2004)
IEEE Trans. Inf. Theor
, vol.50
, pp. 2119-2123
-
-
Kashyap, A.1
Basar, T.2
Srikant, R.3
-
36
-
-
0034250315
-
Analysis of an On-Off jamming situation as a dynamic game
-
Mallik, R. K., Scholtz, R. A., Papavassilopoulos, G. P.: Analysis of an On-Off jamming situation as a dynamic game. IEEE Trans. Comm. 48, 1360-1373 (2000).
-
(2000)
IEEE Trans. Comm
, vol.48
, pp. 1360-1373
-
-
Mallik, R.K.1
Scholtz, R.A.2
Papavassilopoulos, G.P.3
-
37
-
-
63449130855
-
Transmission power control game with SINR as objective function
-
Altman, E., Chaintreau, A. (eds.),. Springer, Heidelberg
-
Altman, E., Avrachenkov, K., Garnaev, A.: Transmission power control game with SINR as objective function. In: Altman, E., Chaintreau, A. (eds.) NET-COOP 2008. LNCS, vol. 5425, pp. 112-120. Springer, Heidelberg (2009).
-
(2009)
NET-COOP 2008. LNCS
, vol.5425
, pp. 112-120
-
-
Altman, E.1
Avrachenkov, K.2
Garnaev, A.3
|